Mass surveillance in Australia

From Wikipedia, the free encyclopedia
Jump to: navigation, search

Mass surveillance in Australia occurs through a variety of means affecting telephone, internet and other communications networks, financial systems, vehicle and transit networks, international travel, access to government services and other parts of society.

Communications[edit]

Telephone[edit]

Australia is known to be an avid user of telephone surveillance. In 2003, Australia issued 75% more wiretap warrants than the US did and this was 26 times greater than the US on a per capita basis.[1] In 2012 it was reported that year-on-year "Access to private data has increased by 20 per cent by Australia’s law enforcement and government agencies – and with no warrant."[2]

In addition, Australia requires that pre-paid mobile telecommunications providers verify the identity of individuals before providing service.[3][4]

Internet[edit]

According to Greens' Senator Scott Ludlam, Australian law enforcement agencies were issued 243,631 warrants to obtain telecommunications logs in the period from July 2010 to June 2011, which vastly overshadowed the 3500-odd legal intercepts of communications.[5]

In 2013 it was reported that under Australian law state, territory and federal law enforcement authorities can access a variety of 'non-content' data from internet companies like Telstra, Optus and Google with authorization by senior police officers or government officials rather than judicial warrant, and that "During criminal and revenue investigations in 2011-12, government agencies accessed private data and internet logs more than 300,000 times."[6]

Google's transparency report shows a consistent trend of growth in requests by Australian authorities for private information, constantly rising approximately 20% year-on-year. The most recent published volume for the period ending December 2013 indicates a volume of around four individual requests per calendar day.[7]

Telstra's transparency report for the period 1 July - 31 December 2013 does not include requests by national security agencies, only police and other agencies. Nevertheless, in the six-month period 40,644 requests were made, 36,053 for "Telstra customer information, carriage service records and pre-warrant checks" (name, address, date of birth, service number, call/SMS/internet records. Call records include called party, date, time and duration. Internet information includes date, time and duration of internet sessions and email logs from Telstra-administered addresses[8]), 2,871 for "Life threatening situations and Triple Zero emergency calls", 270 for "Court orders", 1450 for "Warrants for interception or access to stored communications" (real time access): an average of around 222 requests per calendar day.[9]

Cover page of the first version of the secret UKUSA Agreement, which was disclosed to the public in 2011, and was the basis for the modern Five Eyes international surveillance alliance.
Aerial view of Pine Gap, one of Australia's major spy facilities.
Aerial view of HMAS Harman, another of Australia's major spy facilities.

In 2013 more than 500 authors including five Nobel prize winners and Australian identities Frank Moorhouse, John Coetzee, Helen Garner, Geraldine Brooks and David Malouf signed a global petition to protest mass surveillance[10] after the whistleblower Edward Snowden's global surveillance disclosures informed the world, including Australians, that they are being monitored by the National Security Agency's XKeyscore system and its boundless informant. Snowden had further revealed that Australian government intelligence agencies, specifically the Australian Signals Directorate, also have access to the system as part of the international Five Eyes surveillance alliance.[11]

In August 2014 it was reported[12] that law-enforcement agencies had been accessing Australians' web browsing histories via internet providers such as Telstra without a warrant (Optus confirmed that they cooperate with law enforcement, and Vodafone did not return a request for comment). The revelations came less than a week after government attempts to increase their surveillance powers through new legislation allowing offensive computer hacking by government intelligence agencies, and mere months after outrage surrounding the government's offer to share personal information about citizens with Five Eyes intelligence partners.[13]

As of August 2014, no warrant is required for organizations to access the so-called 'metadata' information of private parties. This is information regarding "calls and emails sent and received, the location of a phone, internet browsing activity. There is no access to the content of the communication, just how, to or from whom, when and where." Under current law many organisations other than federal, state and territory police[14] and security agencies such as ASIO[14] can get access to this information, including "any agency that collects government revenue",[5] for example the RSPCA,[14][5][15] the Australian Crime Commission,[2] the Australian Securities and Investments Commission[14][2] (though reportedly temporarily removed from the list),[14] the Australian Tax Office,[14][2][16] Centrelink,[16] Medicare,[14][2] Australia Post,[14][2][16] the Australian Fisheries Management Authority,[5] the Victorian Taxi Services Commission,[5] the Victorian Transport Accident Commission,[5] WorkSafe Victoria,[14] local councils[15][14] and foreign law enforcement agencies.[15]

In the 2013-2014 financial year there were over half a million disclosures of metadata to agencies.[16]

The Australian Communications and Media Authority provides instructions for internet service providers and other telecommunications providers about their law enforcement, national security and interception obligations.

2014 proposals[edit]

A range of proposals are under discussion that affect surveillance of the population by government in conjunction with commercial service providers.

Hacking powers[edit]

The proposals seek to give the Australian Security Intelligence Organisation the right to hack in to computers and modify them.[17]

Single computer warrant to become umbrella surveillance[edit]

The proposals seek to give the Australian Security Intelligence Organisation the power to spy on whole computer networks under a single computer-access warrant.[17]

Spying on citizens abroad[edit]

The proposals seek to give the Australian Secret Intelligence Service the power to collect intelligence on Australian citizens overseas.[17]

Law against media and whistleblowing[edit]

Section 35P of the proposals seeks to create a new criminal offence, with a maximum penalty of 10 years imprisonment for revealing information about so-called 'special intelligence operations'. There are no exceptions listed, and the law would apply to journalists even if they were unaware that they were revealing information about such an operation. Shadow Attorney-General Mark Dreyfus called the measure "an unprecedented overreach".[17]

Mandatory data retention[edit]

Mandatory data retention for two years of data relating to the internet and telecommunications activity of all Australians is currently under discussion.[15][17]

On Tuesday, August 5, government Communications Minister Malcolm Turnbull complained about "waking up to newspaper headlines concerning the government's controversial plan for mandatory data retention", stating the government "risked unnecessary difficulties by pushing ahead with the data retention regime without fully understanding the details". In 2012, Turnbull had opposed mandatory retention.[18]

On Friday, August 8, Australia's federal privacy commissioner, Timothy Pilgrim, stated he felt it remained "unclear" exactly what data was to be retained, and that "there is the potential for the retention of large amounts of data to contain or reveal a great deal of information about people's private lives and that this data could be considered 'personal information' under the Privacy Act".[18]

Later in the month, the head of Australian Security Intelligence Organisation (ASIO) appealed for access to private citizens' data on the grounds that commercial entities may already be collecting it.[19]

On February 19, 2015 the Australian Broadcasting Corporation's Radio National program Download This Show broadcast an interview with a former police employee who had worked extensively with metadata, on condition of anonymity. The former employee was quoted as feeling the proposed system was open for abuse and may one day be used against Australians who download music and TV shows.[20][21]

On February 22, 2015 Australian Federal Police Assistant Commissioner Tim Morris made the following claims appealing to blind trust from the public.[22]

The quote is a clear instance of the nothing to hide argument, which subtly implies that those who disagree are criminals.

In 2015 the issue of costs became more heavily discussed in the media with figures such as 1% of all national telecommunications revenue annually or "two battleships" per year used.[23]

Prominent parties concerned about the proposals include:[21][16]

Finance[edit]

Australians rejected a national identity card system in 1986, however the Australian Taxation Office (ATO) developed a tax file number (TFN) system instead.

Travel[edit]

International[edit]

General depiction of northern Australia's Jindalee Operational Radar Network, used to track airborne and seaborne vessels across a vast area.

Australia and the European Union have signed in international agreement regarding the advanced sharing of traveler passenger name records for international travelers. These records typically include significantly more information that merely the name of the passenger.

In addition to passenger information and standard radar, Australia uses the Jindalee Operational Radar Network to detect individual boats and planes in the north and west of the country.

Domestic[edit]

Vehicles are tracked by a range of systems including Automatic Number Plate Recognition, video and sensor-based traffic surveillance networks, cellular telephone tracking (if a device is known to be in the vehicle) and automated toll networks. The SCATS system, owned by the New South Wales government and initially deployed in Sydney, is a widely used traffic surveillance system in the country that is known under various other names in Adelaide (ACTS), Canberra (CATSS), Melbourne (SCRAM), the Northern Territory (DARTS) and Perth (PCATS).

Mass transit[edit]

NSW[edit]

In December 2014, certain universities such as Sydney University delayed collaboration with the new Opal card system scheduled to fully replace existing, anonymous paper tickets on New South Wales mass transit, citing privacy concerns,[24] whereas Macquarie University, University of New South Wales and Australian Catholic University had already agreed to provide the "student data" to the card network. Data is made available to other NSW government departments and law enforcement agencies.[25]Concerns about privacy have been repeatedly raised in the mainstream media, with commentators questioning the extent to which user data can be accessed by authorities.[26][27][28] According to the Opal Privacy Policy, data is made available to other NSW government departments and law enforcement agencies. On the 13th of March 2015 it was announced that Opal cards may be linked to commuter car park spaces, such that private road vehicle identities would become associated with individual mass transit use.[29]

Other states[edit]

The extent and frequency to which individual traveler data is released without a warrant remains poorly documented for the following systems:

Related law[edit]

Coat of Arms of Australia.svg
This article is part of a series on the
politics and government of
Australia

This section outlines the main legal references for mass surveillance in Australia.

National[edit]

Under Australian law, the following acts are prominent federal law in the area of surveillance.

A separate body of state-level laws also exists.

International agreements[edit]

Australia is part of the Five Eyes international surveillance network, run by the United States National Security Agency and generally protected from public scrutiny citing 'national security' concerns.

See also[edit]

References[edit]

  1. ^ "Wiretapping Australia". 2003. 
  2. ^ a b c d e f "Australian surveillance ‘out of control’: 20% increase in 1 year". Russia Today. 3 December 2012. 
  3. ^ "Law enforcement (Telecommunications): Identity verification in relation to pre-paid mobile services". Australian Communications and Media Authority. 
  4. ^ "Telecomms & law enforcement: obligations". Australian Communications and Media Authority. 
  5. ^ a b c d e f g "Aus becoming surveillance state: Ludlam". ZDNet. 20 January 2012. 
  6. ^ Nick O'Malley and Ben Grubb (7 June 2013). "Australians at risk in US electronic surveillance program". Sydney Morning Herald. 
  7. ^ "Google Transparency Report: Australia". 
  8. ^ Peter Micek and Matt Solomon (16 April 2014). "Australian Telco Telstra Releases First Transparency Report". 
  9. ^ "Telstra Transparency Report: 1 July - 31 December 2013" (PDF). 
  10. ^ "More than 500 authors sign global petition to protest mass surveillance". The Australian. 10 December 2013. 
  11. ^ Dorling, Philip (July 8, 2013). "Snowden Reveals Australia's Links to US Spy Web". The Sydney Morning Herald. Retrieved August 2, 2013. 
  12. ^ Ben Grubb (20 August 2014). "Telstra found divulging web browsing histories to law-enforcement agencies without a warrant". Sydney Morning Herald. 
  13. ^ Aaron Gluck Thaler (15 August 2014). "Australia government pushing to expand surveillance, hacking powers". Privacy International. 
  14. ^ a b c d e f g h i j Ben Grubb (26 February 2015). "What George Brandis and Malcolm Turnbull can do to fix metadata muddle". Retrieved 26 February 2015. 
  15. ^ a b c d Gillian Lord (25 July 2014). "Privacy fears as Australian surveillance laws are dragged into the digital era". The Guardian. 
  16. ^ a b c d e Ben Grubb (12 March 2015). "Dutch do a U-turn on metadata laws". Sydney Morning Herald. Retrieved 13 March 2015. 
  17. ^ a b c d e "Citizens Not Suspects: Learn More". 
  18. ^ a b c d James Massola and Ben Grubb (9 August 2014). "Data retention Hokey Pokey: Liberals caught in public embarrassment over privacy". 
  19. ^ Ben Grubb (22 August 2014). "Metadata ambiguity to be resolved by government data retention policy paper: sources". Sydney Morning Herald. 
  20. ^ a b Marc Fennel (19 February 2015). "Metadata regime open to abuse: insider". Australian Broadcasting Corporation's Radio National program Download This Show. 
  21. ^ a b c Ben Grubb (21 February 2015). "Trust spies and police on metadata retention to fight terrorism and crime, Attorney-General George Brandis pleads". Sydney Morning Herald. Retrieved 23 February 2015. 
  22. ^ a b Lia Timson (22 February 2015). "Metadata retention: 'Those with nothing to hide have nothing to fear', says Australian Federal Police Assistant Commissioner Tim Morris". Sydney Morning Herald. 
  23. ^ Ben Grubb (2 March 2015). "Australians harass George Brandis as the true cost of metadata retention is revealed". Retrieved 3 March 2015. 
  24. ^ Pallavi Singhal. "Student Opal card privacy concerns limit university participation". 
  25. ^ "Opal Privacy Policy" (PDF). 
  26. ^ Riemer, Kai. "Privacy has taken a back seat amid the Opal debate". Sydney Morning Herald. Retrieved 9 June 2014. 
  27. ^ "Sydney Opal card travel history can be accessed by police". 30 June 2014. 
  28. ^ "No warrants needed to access Opal card records". Sydney Morning Herald. 15 July 2014. 
  29. ^ Jacob Saulwick (13 March 2015). "Opal access? New car parks for Western Sydney stations could be restricted to rail commuters". Sydney Morning Herald. Retrieved 14 March 2015. 

External links[edit]